WO2018146169A1 - Véhicule à moteur muni d'un réseau de données interne au véhicule ainsi que procédé de fonctionnement du véhicule à moteur - Google Patents

Véhicule à moteur muni d'un réseau de données interne au véhicule ainsi que procédé de fonctionnement du véhicule à moteur Download PDF

Info

Publication number
WO2018146169A1
WO2018146169A1 PCT/EP2018/053121 EP2018053121W WO2018146169A1 WO 2018146169 A1 WO2018146169 A1 WO 2018146169A1 EP 2018053121 W EP2018053121 W EP 2018053121W WO 2018146169 A1 WO2018146169 A1 WO 2018146169A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
motor vehicle
message
data network
zones
Prior art date
Application number
PCT/EP2018/053121
Other languages
German (de)
English (en)
Inventor
Elmar SCHOCH
Original Assignee
Audi Ag
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Audi Ag filed Critical Audi Ag
Priority to EP18704226.2A priority Critical patent/EP3523930B1/fr
Priority to US16/479,525 priority patent/US20190356574A1/en
Priority to CN201880006262.5A priority patent/CN110337799B/zh
Publication of WO2018146169A1 publication Critical patent/WO2018146169A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/10Routing in connection-oriented networks, e.g. X.25 or ATM
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/48Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L2012/40208Bus networks characterized by the use of a particular bus standard
    • H04L2012/40215Controller Area Network CAN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L2012/40208Bus networks characterized by the use of a particular bus standard
    • H04L2012/40241Flexray
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L2012/40267Bus for use in transportation systems
    • H04L2012/40273Bus for use in transportation systems the transportation system being a vehicle
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]

Definitions

  • Motor vehicle with an in-vehicle data network and method for operating the motor vehicle
  • the invention relates to a motor vehicle having an in-vehicle data network through which control devices of the motor vehicle are coupled to each other for exchanging messages.
  • the invention also includes a method for operating the in-vehicle data network in the motor vehicle.
  • a motor vehicle control units can be interconnected or coupled by a data network, so that the control units can exchange messages with each other.
  • a message for example, a measured value or a control command can be communicated.
  • a message represents at least one data packet which is transmitted by a first of the control devices, the sender, to at least one other control device, a respective addressee or recipient.
  • a message may include one or more data packets.
  • the recipient may be indicated therein, for example by specifying an address and an identification number of the receiving control device.
  • a driver assistance system is known from DE 10 2013 021 231 A1, which has two microprocessors in order to provide the assistance function with one, while the other microprocessor is used for the communication.
  • protection of the assistance function against manipulation is provided within the control unit of the driver assistance system.
  • each control unit to be protected itself requires two microprocessors to provide the protection function.
  • the data network itself remains unprotected.
  • US 2016/0255154 A1 describes a motor vehicle with a data network that can be divided into security zones that can be organized in a tree structure. The division into security zones is achieved by the appropriate choice of network topology.
  • US 2014/0306826 A1 describes a motor vehicle in which devices can be connected to a communication network, wherein each device can be connected to another zone of the communication network depending on the security requirement.
  • Each zone can be realized by means of a switch of an Ethernet network, whereby the switches and thus the zones are then separated by firewalls.
  • the invention provides a motor vehicle with an in-vehicle data network.
  • control devices of the motor vehicle are coupled to each other for exchanging messages.
  • in-vehicle is meant that it is about a data network, that the controllers network with each other, so in particular not primarily that a control unit with a vehicle external or external vehicle data source, such as a server of the Internet, coupled.
  • the data network is divided into a plurality of security zones, within which in each case at least one of the control devices is arranged.
  • control devices with the same security requirement or a group of control devices with predefined security requirements can be combined in one security zone.
  • a security zone thus represents a segment in the data network to which at least one of the control units is connected in each case.
  • the security zones are separated in the data network but are still coupled together for a conditional message exchange.
  • data controllers or domain controllers are provided, each of which separates at least two of the security zones from each other and is adapted to transmit at least one of said messages between at least two of the security zones separate from it if the message meets a predetermined security criterion, and but to block the transmission of the message if the message violates the security criterion.
  • the separation of the security zones is thus that a message is transmitted between each two security zones only after a prior control of the message.
  • a message can thus not be spread or distributed arbitrarily in the data network.
  • a message only comes to the end of the security zone, in the the message has been generated, that is, to the domain control device or to the domain control devices, which each separate the security zone of at least one further security zone.
  • the security criterion is checked independently of the sending controller, ie detected whether the message is allowed and therefore can be transmitted in at least one other security zone or if the message is inadmissible and thus to block.
  • the invention provides the advantage that a defective or manipulated control unit can only reach control units within its own security zone by messages and an influence on at least one other of the control units in at least one other of the security zones by checking the security criterion in at least one of the domain control units is prevented.
  • At least two of the security zones are only logically separated from each other by the logically separated security zones are each realized as a VLAN (Virtual Local Area Network).
  • VLAN Virtual Local Area Network
  • each of the physically separate security zones has its own data line.
  • two security zones based on the same network technology, for example Ethernet can be physically separated from each other in this way.
  • the physical separation has the advantage that, even in the knowledge of the MAC address (MAC - Media Access Control), manipulating the messages further makes it impossible to address or to assign a control device in a physically separate security zone with a manipulated message to reach.
  • At least one of the control devices preferably has a firewall and / or a message filter and / or a routing unit for routing the security zones to be separated from it for routing the at least one message.
  • a firewall can be realized on the basis of the Internet Protocol (IP) and thus advantageously independently of a message content of the message. Additionally or alternatively, the firewall may provide for monitoring or verification of the service protocol (protocol above the IP in the ISO / OSI reference model) (ISO - International Organization for Standardization; OSI - Open Systems Interconnection). This results in the advantage that even such a message is detected as manipulated, which is designed to manipulate operating software of the addressed controller, but it is generated correctly according to the IP. An example of such a message is a so-called stack overflow attack.
  • a message filter can distinguish between messages of different classes, for example between a message for notifying a measured value on the one hand and a message for specifying a control command on the other hand.
  • the message filter can pass messages for metrics but block messages with control commands.
  • a message filter can thus filter out a message on the basis of a message content or the user data that is exchanged between a respective operating software of two control units.
  • a routing unit can separate them by providing different message protocols or transmission protocols for the different security zones. The routing unit can then translate a message from a security zone, which is written in a first message protocol, into a second message protocol and forward it in the other security zone.
  • the respective security criterion results, by means of which it can be decided whether a message is forwarded or blocked.
  • a preferred embodiment provides that a tree hierarchy is formed by the security zones, by which in each case at least two of the domain control devices are combined by a respective higher-level domain control device.
  • “summarize” is meant that the two domain controllers are coupled through the parent domain controller and to reach the security zone of one of the domain controllers by an overriding domain controller. bearing the message, both the security cri- teria of the superordinate domain controller and the security criterion of the security zone domain controller itself must be met. This allows a number of domain controllers to pass through or traverse a trail en route from the sending controller to the receiving controller for a given transmission schedule of messages in a motor vehicle.
  • a vehicle-remote data network or vehicle-external device can also be integrated.
  • a communication device is preferably set up to couple the data network via a radio link to at least one vehicle-external device and / or external data network and to operate this each in its own safety zone.
  • the communication device may comprise, for example, a mobile radio module and / or a Bluetooth radio module and / or a WLAN (Wireless Local Area Network) radio module.
  • the respective radio connection can be a mobile radio connection or a Bluetooth connection or a WLAN connection.
  • An off-board device may be, for example, a mobile terminal such as a smartphone or a tablet PC or a smartwatch.
  • Such a mobile terminal can be connected via the radio link to the motor vehicle.
  • a vehicle-external device can also be connected to the data network via a wired communication connection, for example a USB connection (USB - Universal Serial Bus).
  • a non-vehicle data network can be, for example, the Internet or a tunnel connection (VPN - Virtual Private Network) to a server device.
  • Each vehicle-external device and / or data network external to the vehicle is separated from the control devices of the motor vehicle by providing its own safety zone by means of at least one domain control device.
  • a domain controller may, for example, be another controller or a gateway or a router or a switch (network switch).
  • the data network may comprise at least one of the following network technologies: Ethernet, Controller Area Network (CAN), FlexRay, MOST (Media Oriented Systems Transport ).
  • the limits of the respective network technology can be different from the boundaries of the security zones.
  • the data network can have hybrid networking, by means of which at least two different network are combined technology, in particular at least one security zone can have at least two of the network technologies.
  • the security criterion can be specified or set by configuring a firewall or a message filter.
  • the security criterion preferably additionally or alternatively includes that a sender and / or an addressee of the message to be transmitted agree with a respectively predetermined control unit specification. In other words, the message must come from a predetermined sender and / or be addressed to at least one predetermined addressee.
  • the security criterion may include that a message type of the message to be transmitted matches a predetermined type indication. This has already been written in connection with the distinction between a measured value and a control command.
  • the security criterion may include that the message to be transmitted meets a predetermined plausibility condition. For example, a rate or frequency of messages of a given message type may be required within a predetermined value interval. Additionally or alternatively, a message content, for example, a measurement, may be checked to see if it is within a predetermined range.
  • the motor vehicle according to the invention is preferably designed as a motor vehicle, in particular as a passenger car or truck.
  • the invention also includes a method for operating an in-vehicle data network in a motor vehicle.
  • the data network coupled in the manner described control units of the motor vehicle for exchanging messages with each other.
  • the data network is subdivided into a plurality of security zones within which at least one of the control devices is arranged in each case.
  • Domain controllers each keep at least two of the security zones separated from one another by each domain controller only ever overlaying at least one of the messages between at least two of the security zones separated by them. if the message satisfies a predetermined security criterion and otherwise blocks the transmission of the message if the security criterion is violated.
  • the invention also includes developments of the method according to the invention, which have features as they have already been described in connection with the developments of the motor vehicle according to the invention. For this reason, the corresponding developments of the method according to the invention are not described again here.
  • FIG. Shows a schematic representation of an embodiment of the motor vehicle according to the invention.
  • the exemplary embodiments explained below are preferred embodiments of the invention.
  • the described components of the embodiments each represent individual features of the invention, which are to be considered independently of one another, which each further develop the invention independently of one another and thus also individually or in a different combination than the one shown as part of the invention.
  • the described embodiments can also be supplemented by further features of the invention already described.
  • functionally identical elements are each provided with the same reference numerals.
  • the figure shows a motor vehicle 10, which may be, for example, a motor vehicle, in particular a passenger car or truck. Furthermore, a server device 1 1, the Internet 12 and a mobile radio network 13 are shown.
  • the server device 1 1 can be coupled via an Internet connection 14 and a radio link 15 of the mobile radio network 13 to a communication device 16 of the motor vehicle.
  • the wireless connection 15 may also be provided, for example, by a WLAN router.
  • the server device 27 may be, for example, a server of the Internet, ie a computer or a computer network connected to the Internet.
  • a data network 17 may be provided, which may also comprise several different network technologies, for example an Ethernet ETH and / or a CAN bus CAN.
  • the server device 1 1 can be coupled to the data network 17 via the communication device 16.
  • the communication device 16 can be designed, for example, as a mobile radio module and / or a WLAN radio module.
  • a mobile terminal 18 can be coupled to the data network 17, for example via a radio link 19, which can be provided by means of a Bluetooth radio module 20 (BT) of the motor vehicle 10.
  • BT Bluetooth radio module
  • the terminal 18 may be, for example, a smartphone and / or a tablet PC or a smartwatch.
  • control devices 21 can be interconnected or coupled to one another for exchanging messages 23 by data lines and / or radio links. At least one or some of the control units 21 can also exchange messages 24 with the server device 1 1 and / or the terminal 16, respectively.
  • a control unit 21 may each be, for example, an engine control unit or a seat control unit or an infotainment control unit (infotainment - information entertainment) or an ESC control unit (ESC - electronic stability control).
  • a manipulation of the control unit 21, which affects the operation of the control unit 21, may have different effects on the driving safety of the motor vehicle 10.
  • Such manipulation may be caused, for example, by a manipulated message 23, 24 or by uncontrolled sending of such messages 23, 24 by a defective other controller (e.g., so-called "Babbling Idiot").
  • control units 21 may be divided into different groups depending on the need for protection, which in turn are separated from each other by security measures.
  • the data network 17 can be divided into security zones 25, 26 or divided.
  • security zones 25, 26 represent for this purpose a physical and / or logical segmenting or zoning, wherein in each security zone 25,
  • control units 21 similar criticality or with a similar security need, for example, as measured by the ASIL, can be summarized.
  • Controllers 21 can be summarized with the same ASIL.
  • the security zones 25, 26 may be separated from each other by a domain control device 27.
  • control unit 22 may be provided or implemented by a control unit 22, for example.
  • a domain control device 27 can be between two security zones 25, 26 each example, a firewall and / or protocol translation or protocol implementation on one or more or all protocol layers according to the ISO / OSI
  • Ethernet networks ETH e.g. VLANs are used in combination with IP and service protocol firewalls (service protocol: protocol above the IP protocol in the ISO / OSI reference model).
  • a connection of the mobile terminal 18 can also be separated or isolated from the remaining security zones 25 of the data network 17 by a domain control device 27 as its own security zone 26.
  • the respective configuration of a firewall and / or protocol conversion results in a security criterion 28 for each domain control device 27, on the basis of which a message 23 to be transmitted between two security zones 25, 26 by the domain control device 27 can be checked as to whether the message 23, 24 should be transmitted or blocked by the domain controller 27.
  • the representation of the data network 17 in the figure illustrates how, by the arrangement of the domain controllers 27 in the data network 17, this may have a tree hierarchy 29.
  • One of the domain controllers 27 may represent the root 31 of the tree hierarchy 30 from which further of the domain controllers 27 may each represent a node 32 in the tree hierarchy 30.
  • the security zones 25, 26 can increase security through a consistent security architecture between electrical and / or electronic control devices 21.
  • an external server device 11 may advantageously also be integrated.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Small-Scale Networks (AREA)

Abstract

L'invention concerne un véhicule à moteur (10) muni d'un réseau de données interne au véhicule (17), au moyen duquel des appareils de commande (21) du véhicule à moteur (10) sont couplés l'un à l'autre pour échanger des messages (23). Selon l'invention, le réseau de données (17) est subdivisé en une pluralité de zones de sécurité (25), à l'intérieur desquelles au moins l'un des appareils de commande (21) est respectivement disposé et des dispositifs de contrôle de domaine (27) sont fournis, chacune desquels séparant au moins deux des zones de sécurité (25) et ledit réseau de données est conçu pour transmettre au moins l'un des messages (23) entre au moins deux des zones de sécurité (25) séparées lorsque le message (23) satisfait un critère de sécurité (28) prédéterminé et pour bloquer la transmission du message (23) lorsque le critère de sécurité (28) est enfreint.
PCT/EP2018/053121 2017-02-09 2018-02-08 Véhicule à moteur muni d'un réseau de données interne au véhicule ainsi que procédé de fonctionnement du véhicule à moteur WO2018146169A1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP18704226.2A EP3523930B1 (fr) 2017-02-09 2018-02-08 Véhicule à moteur muni d'un réseau de données interne au véhicule ainsi que procédé de fonctionnement du véhicule à moteur
US16/479,525 US20190356574A1 (en) 2017-02-09 2018-02-08 Motor vehicle comprising an internal data network and method for operating the motor vehicle
CN201880006262.5A CN110337799B (zh) 2017-02-09 2018-02-08 具有车辆内部的数据网络的机动车以及运行机动车的方法

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102017202022.9A DE102017202022A1 (de) 2017-02-09 2017-02-09 Kraftfahrzeug mit einem fahrzeuginternen Datennetzwerk sowie Verfahren zum Betreiben des Kraftfahrzeugs
DE102017202022.9 2017-02-09

Publications (1)

Publication Number Publication Date
WO2018146169A1 true WO2018146169A1 (fr) 2018-08-16

Family

ID=61189458

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2018/053121 WO2018146169A1 (fr) 2017-02-09 2018-02-08 Véhicule à moteur muni d'un réseau de données interne au véhicule ainsi que procédé de fonctionnement du véhicule à moteur

Country Status (5)

Country Link
US (1) US20190356574A1 (fr)
EP (1) EP3523930B1 (fr)
CN (1) CN110337799B (fr)
DE (1) DE102017202022A1 (fr)
WO (1) WO2018146169A1 (fr)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR3071800B1 (fr) * 2017-09-29 2021-04-02 Psa Automobiles Sa Procede d’assistance a la conduite d’un vehicule lors d’une defaillance d’un reseau et systeme associe
DE102018219262A1 (de) * 2018-11-12 2020-05-14 Continental Automotive Gmbh Vorrichtung zum Absichern eines Echtzeit-Ethernet-Datennetzwerks für ein Kraftfahrzeug
DE102018221742A1 (de) 2018-12-14 2020-06-18 Volkswagen Aktiengesellschaft Verfahren zum Betreiben eines Datennetzwerks eines Kraftfahrzeugs und Kraftfahrzeug mit einem entsprechend betreibbaren Datennetzwerk
KR20220068239A (ko) * 2019-09-20 2022-05-25 소나투스, 인코포레이티드 추가 차량 통신 제어를 위한 시스템, 방법, 및 장치
US11538287B2 (en) * 2019-09-20 2022-12-27 Sonatus, Inc. System, method, and apparatus for managing vehicle data collection
DE102019129628B3 (de) * 2019-11-04 2021-05-06 Audi Ag Verfahren und Steuergerät zum Detektieren eines unautorisierten Datenverkehrs in einem paketorientierten Datennetzwerk eines Kraftfahrzeugs sowie entsprechendes Kraftfahrzeug
US11772583B2 (en) 2020-03-06 2023-10-03 Sonatus, Inc. System, method, and apparatus for managing vehicle automation
CN114124984A (zh) * 2020-08-24 2022-03-01 宝能汽车集团有限公司 车辆及其的总线网络拓扑结构
DE102020123202A1 (de) 2020-09-04 2022-03-10 Krauss-Maffei Wegmann Gmbh & Co. Kg CAN-Bus-Netzwerk
DE102021117500A1 (de) * 2021-07-07 2023-01-12 Zf Cv Systems Global Gmbh Vorrichtung zur abgesicherten Kommunikation zwischen Steuergeräten in einem Fahrzeug, elektronische Verarbeitungseinheit und Fahrzeug
DE102021129592A1 (de) 2021-11-12 2023-05-17 Jungheinrich Aktiengesellschaft Flurförderzeug mit einer Datenkommunikationsvorrichtung sowie Verfahren zum Betreiben derselben
CN114745454A (zh) * 2022-04-11 2022-07-12 中国南方电网有限责任公司 边界防护装置、系统、方法、计算机设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10319365A1 (de) 2003-04-29 2004-11-18 Volkswagen Ag Computersystem für ein Fahrzeug und Verfahren zum Kontrollieren des Datenverkehrs in ein solches Computersystem
DE102011007437A1 (de) 2010-11-15 2012-05-16 Continental Teves Ag & Co. Ohg Verfahren und Schaltungsanrodnung zur Datenübertragung zwischen Prozessorbausteinen
US20140306826A1 (en) 2012-03-14 2014-10-16 Flextronics Ap, Llc Automatic communication of damage and health in detected vehicle incidents
DE102013021231A1 (de) 2013-12-13 2015-06-18 Daimler Ag Verfahren zum Betrieb eines Assistenzsystems eines Fahrzeugs und Fahrzeugsteuergerät
US20160255154A1 (en) 2013-10-08 2016-09-01 Ictk Co., Ltd. Vehicle security network device and design method therefor
DE102015209361A1 (de) * 2015-05-21 2016-11-24 Bayerische Motoren Werke Aktiengesellschaft Paketbasiertes Kommunikationsnetz mit Autokonfigurierung lokaler Netzwerk-Adressen

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102013202064A1 (de) * 2013-02-08 2014-08-14 Bayerische Motoren Werke Aktiengesellschaft Verfahren und Vorrichtung zum Verbinden eines Diagnosegeräts mit einem Steuergerät in einem Kraftfahrzeug
JP5838983B2 (ja) * 2013-02-25 2016-01-06 トヨタ自動車株式会社 情報処理装置及び情報処理方法
DE102014004004A1 (de) * 2014-03-20 2015-09-24 Audi Ag Steuergerät in einem Kraftfahrzeug, Kraftfahrzeug und Verfahren zum Betrieb eines Steuergeräts

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10319365A1 (de) 2003-04-29 2004-11-18 Volkswagen Ag Computersystem für ein Fahrzeug und Verfahren zum Kontrollieren des Datenverkehrs in ein solches Computersystem
DE102011007437A1 (de) 2010-11-15 2012-05-16 Continental Teves Ag & Co. Ohg Verfahren und Schaltungsanrodnung zur Datenübertragung zwischen Prozessorbausteinen
US20140306826A1 (en) 2012-03-14 2014-10-16 Flextronics Ap, Llc Automatic communication of damage and health in detected vehicle incidents
US20160255154A1 (en) 2013-10-08 2016-09-01 Ictk Co., Ltd. Vehicle security network device and design method therefor
DE102013021231A1 (de) 2013-12-13 2015-06-18 Daimler Ag Verfahren zum Betrieb eines Assistenzsystems eines Fahrzeugs und Fahrzeugsteuergerät
DE102015209361A1 (de) * 2015-05-21 2016-11-24 Bayerische Motoren Werke Aktiengesellschaft Paketbasiertes Kommunikationsnetz mit Autokonfigurierung lokaler Netzwerk-Adressen

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
G. MALAGUTI; M. DIAN; C. FERRARESI; M. RUGGERI: "Comparison on Technological Opportunities for In-Vehicle Ethernet Networks", PROCEEDINGS OF INDIN 2013, IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, vol. 11, 2013, pages 108 - 115, XP032498257, DOI: doi:10.1109/INDIN.2013.6622867
MALAGUTI GIORGIO ET AL: "Comparison on technological opportunities for in-vehicle Ethernet networks", 2013 11TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), IEEE, 29 July 2013 (2013-07-29), pages 108 - 115, XP032498257, DOI: 10.1109/INDIN.2013.6622867 *

Also Published As

Publication number Publication date
DE102017202022A1 (de) 2018-08-09
CN110337799B (zh) 2021-07-27
EP3523930A1 (fr) 2019-08-14
US20190356574A1 (en) 2019-11-21
EP3523930B1 (fr) 2020-04-08
CN110337799A (zh) 2019-10-15

Similar Documents

Publication Publication Date Title
EP3523930B1 (fr) Véhicule à moteur muni d'un réseau de données interne au véhicule ainsi que procédé de fonctionnement du véhicule à moteur
EP1566029B1 (fr) Unite de passerelle permettant de connecter des sous-reseaux, notamment dans des vehicules
EP2954498B1 (fr) Procédé et dispositif de raccordement d'un appareil de diagnostic à une unité de commande montée dans un véhicule à moteur
EP2684154B1 (fr) Procédé et unité de commande pour la reconnaissance de manipulations frauduleuses sur un réseau de véhicule
WO2015028342A1 (fr) Changement du mode de fonctionnement d'un dispositif de commande entre un bus de diagnostic et une liaison ethernet externe
DE102010026433A1 (de) Steuernetzwerk für ein Schienenfahrzeug
WO2012167995A2 (fr) Nœud de connexion pour un réseau de communication
EP2862319A1 (fr) Réseau en anneau pour véhicule
WO2020187985A1 (fr) Procédé de surveillance de la communication sur un bus de communication, dispositif électronique de branchement à un bus de communication ainsi que véhicule
DE102013217595A1 (de) Bereitstellung unterschiedlicher Datenübertragungsraten und Redundanz durch gemeinsame und getrennte Nutzung von physikalischen Übertragungskanälen im Kraftfahrzeug
EP3496975B1 (fr) Véhicule automobile ayant un réseau de données divisé en plusiers domaines séparés et procédé d'exploitation du réseau de données
WO2015197758A1 (fr) Réseau de données d'un système, en particulier d'un véhicule
EP3262797A1 (fr) Réseau de communication de véhicule automobile muni d'un dispositif de commutation
DE102011007588A1 (de) Verfahren und Vorrichtung zur Steuerungs-Kommunikation zwischen gekoppelten Zugteilen
EP2448182B1 (fr) Procédé de communication dans un système d'automatisation
EP3497890B1 (fr) Procédé de transmission de messages entre des appareils de commande d'un véhicule à moteur ainsi que dispositif de commutation et véhicule à moteur
DE102012219093A1 (de) Cyber-Sicherheit in einem Kraftfahrzeugnetzwerk
EP1645098B1 (fr) Dispositif et appareil de couplage appele commutation de securite pour securiser l'acces a des donnees
EP2721803B1 (fr) Méthode et système pour configurer un dispositif de réseau d'une façon sécure
WO2021099186A2 (fr) Procédé de surveillance de la communication sur un bus de communication, dispositif électronique pour connexion à un bus de communication ainsi que dispositif de surveillance central pour connexion à un bus de communication
DE102022107431B3 (de) Verfahren zum Nachrüsten einer Socks-Kompatibilität für zumindest eine Anwendung in einem Kraftfahrzeug sowie entsprechend eingerichtetes Kraftfahrzeug
WO2020233905A1 (fr) Dispositif de distribution et procédé

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18704226

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2018704226

Country of ref document: EP

Effective date: 20190506